Static task
static1
Behavioral task
behavioral1
Sample
2e881b2d54ba4cf11c2e8314837e3e3beca5626dcb9fa64c33798a2a08242ac6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e881b2d54ba4cf11c2e8314837e3e3beca5626dcb9fa64c33798a2a08242ac6.exe
Resource
win10v2004-20220812-en
General
-
Target
2e881b2d54ba4cf11c2e8314837e3e3beca5626dcb9fa64c33798a2a08242ac6
-
Size
436KB
-
MD5
4907e8ba4f2839ba3f37e519b2469a90
-
SHA1
6064af3e6c3f1a6bc599cdc206dfdd78a471abae
-
SHA256
2e881b2d54ba4cf11c2e8314837e3e3beca5626dcb9fa64c33798a2a08242ac6
-
SHA512
f642b8d1cab70cffedb0c117e1507fb4f115352f7b457c197fcd7138f06bd882bc15ce01f6351bcb0188f24bebcc8a1761d91a97f166d3d52adfc072633c240c
-
SSDEEP
6144:ycfVAwfLGiPXhoJt2tNRo1BW2rdOiHe2YDwq5:yoLytGNREW2rwzH
Malware Config
Signatures
Files
-
2e881b2d54ba4cf11c2e8314837e3e3beca5626dcb9fa64c33798a2a08242ac6.exe windows x86
cf40fab5a2f65e08d364b7e6834e4a15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetDriveTypeW
GetDriveTypeA
GetFileSize
WaitForSingleObject
DeleteFileW
DeviceIoControl
IsBadWritePtr
ResetEvent
CreateEventA
QueryDosDeviceA
SetEndOfFile
CreateDirectoryA
GetTempFileNameA
CreateDirectoryW
GetTempFileNameW
CreateFileA
CreateFileW
WriteFile
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
GetStartupInfoA
GetShortPathNameA
MultiByteToWideChar
lstrlenA
InterlockedIncrement
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
GetCommandLineA
lstrcmpiA
GetCurrentThreadId
GetCurrentThread
InterlockedDecrement
CloseHandle
CreateMutexA
ReadFile
SetFilePointer
WideCharToMultiByte
GetLastError
user32
CharNextA
GetMessageA
wsprintfA
DispatchMessageA
PostThreadMessageA
MessageBoxA
LoadStringA
msvcrt
__set_app_type
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
_stati64
_wstati64
wcslen
_splitpath
_makepath
_wmakepath
_wsplitpath
swprintf
wcschr
wcscpy
wcscat
malloc
free
vsprintf
puts
fopen
vfprintf
fclose
__CxxFrameHandler
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
strncpy
strncmp
strtok
toupper
_wcslwr
_wcsicmp
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
RegEnumKeyExW
RegEnumKeyExA
RegQueryValueExW
RegSetValueExW
RegSetValueExA
RegCreateKeyExW
RegCreateKeyExA
RegDeleteKeyW
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenThreadToken
CreateServiceA
DeleteService
ControlService
StartServiceCtrlDispatcherA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CopySid
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
OpenProcessToken
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ole32
CoInitializeSecurity
CoDisconnectObject
CoRegisterClassObject
CoRevokeClassObject
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
SysStringLen
shlwapi
PathFileExistsA
PathFileExistsW
winmm
timeGetTime
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE